r> [8] Lee, N., Kim, H., Chang, D. and Lee, H. (2007) Providing Seamless Services with Satellite and Terrestrial Network in Mobile Two Way Satellite Environments. Managing Next Generation Networks and Services, Lecture Notes in Computer Science, 4773, 551-554.
http://dx.doi.org/10.1007/978-3-540-75476-3_63 [9] Gopal, R. and Parthasarathy, V. (2014) MAW: Modified Algebraic Watchdog for Detecting and Mitigating the Misbehavior of Malicious Nodes in Cooperative Wireless Networks. International Journal of Applied Engineering Research, 9, 22907-22920. [10] Gopal, R. and Parthasarathy, V. (2015) HBSIDS: Improving Energy Efficiency of Human Body Sensor Based Intrusion Detection System in a Cooperative Network. Australian Journal of Basic and Applied Sciences, 9, 551-558. [11] Tomasin, S. (2011) Consensus-Based Detection of Malicious Nodes in Cooperative Wireless Networks. IEEE Communications Letters, 15, 404-406.
http://dx.doi.org/10.1109/LCOMM.2011.022411.102050 [12] Djenouri, D. and Badache, N. (2008) Struggling against Selfishness and Black Hole Attacks in MANETs. Wireless Communications and Mobile Computing, 8, 689-704.
http://dx.doi.org/10.1002/wcm.493 [13] Hussain, F.K., Chang, E. and Hussain, O.K. (2007) State of the Art Review of the Existing Bayesian-Network Based Approaches to Trust and Reputation Computation. Second International Conference on Internet Monitoring and Protection, 1-5 July 2007.
http://dx.doi.org/10.1109/icimp.2007.43 [14] Buchegger, S. and Le Boudec, J.-Y. (2002) Performance Analysis of the Confidant Protocol: Cooperation of Nodes-Fairness in Distributed Ad Hoc Networks. Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, 9-11 June 2002, 226-236.
http://dx.doi.org/10.1145/513800.513828 [15] Zhou, Y. and Ng, T.S. (2009) Performance Analysis on MIMO-OFCDM Systems with Multi-Code Transmission. IEEE Transactions on Wireless Communications, 8, 4426-4433.
http://dx.doi.org/10.1109/TWC.2009.081136 [16] Laneman, J.N., Tse, D.N.C. and Wornell, G.W. (2004) Cooperative Diversity in Wireless Networks: Efficient Protocols and Outage Behavior. IEEE Transactions on Information Theory, 50, 3062-3080.
http://dx.doi.org/10.1109/TIT.2004.838089 [17] Gunduz, D. and Erkip, E. (2007) Opportunistic Cooperation by Dynamic Resource Allocation. IEEE Transactions on Wireless Communications, 6, 1446-1454.
http://dx.doi.org/10.1109/TWC.2007.348341 [18] Ikki, S. and Ahmed, M.H. (2007) Performance Analysis of Cooperative Diversity Wireless Networks over Nakagami-m Fading Channel. IEEE Communications Letters, 11, 334-336.
http://dx.doi.org/10.1109/LCOM.2007.348292 [19] Safari, M. and Uysal, M. (2008) Cooperative Diversity over Log-Normal Fading Channels: Performance Analysis and Optimization. IEEE Transactions on Wireless Communications, 7, 1963-1972.
http://dx.doi.org/10.1109/TWC.2008.070393 [20] Azgin, A., Altunbasak, Y. and AlRegib, G. (2005) Cooperative MAC and Routing Protocols for Wireless Ad Hoc Networks. GLOBECOM‘05 IEEE of Global Telecommunications Conference, St. Louis, 28 November-2 December 2005, 2854-2859.
http://dx.doi.org/10.1109/glocom.2005.1578280 [21] Korakis, T., Narayanan, S., Bagri, A. and Panwar, S. (2006) Implementing a Cooperative MAC Protocol for Wireless LANs. 2006 IEEE International Conference on Communications, San Francisco, 27 November-1 December 2006, 4805-4810.
http://dx.doi.org/10.1109/icc.2006.255400 [22] Wyner, A.D. (1975) The Wire-Tap Channel. Bell System Technical Journal, 54, 1355-1387.
http://dx.doi.org/10.1002/j.1538-7305.1975.tb02040.x [23] Leung-Yan-Cheong, S.K. and Hellman, M.E. (1978) The Gaussian Wiretap Channel. IEEE Transactions on Information Theory, 24, 451-456.
http://dx.doi.org/10.1109/TIT.1978.1055917 [24] Makda, S., Choudhary, A., Raman, N., Korakis, T., Tao, Z. and Panwar, S. (2008) Security Implications of Cooperative Communications in Wireless Networks. 2008 IEEE in Sarnoff Symposium, Princeton, 28-30 April 2008, 1-6.
http://dx.doi.org/10.1109/SARNOF.2008.4520069 [25] Nadeem, A. and Howarth, M.P. (2014) An Intrusion Detection & Adaptive Response Mechanism for MANETs. Ad Hoc Networks, 13, 368-380.
http://dx.doi.org/10.1016/j.adhoc.2013.08.017 [26] Mitrokotsa, A. and Dimitrakakis, C. (2013) Intrusion Detection in MANET Using Classification Algorithms: The Effects of Cost and Model Selection. Ad Hoc Networks, 11, 226- 237.
http://dx.doi.org/10.1016/j.adhoc.2012.05.006 [27] Thomas Paul Roy, A. and Balasubadra, K. (2015) DAD: A Secured Routing Protocol for Detecting and Preventing Denial-of-Service in Wireless Networks. Wireless Personal Communications, 1-15.

  
comments powered by Disqus
CS Subscription
E-Mail Alert
CS Most popular papers
Publication Ethics & OA Statement
CS News
Frequently Asked Questions
Recommend to Peers
Recommend to Library
Contact Us

Copyright © 2020 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.